View Single Post
Old 08.23.2013, 08:10 AM   #232
tesla69
Banned
 
Join Date: Oct 2006
Location: NYC
Posts: 4,055
tesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's assestesla69 kicks all y'all's asses
So the German govt has evidence Windows 8 includes a method for Microsoft to gain access to your pc remotely without your knowledge. Maybe I need to look int Linux...

http://www.testosteronepit.com/home/...use-windo.html

The backdoor is called “Trusted Computing,” developed and promoted by the Trusted Computing Group, founded a decade ago by the all-American tech companies AMD, Cisco, Hewlett-Packard, IBM, Intel, Microsoft, and Wave Systems. Its core element is a chip, the Trusted Platform Module (TPM), and an operating system designed for it, such as Windows 8. Trusted Computing Group has developed the specifications of how the chip and operating systems work together.
Its purpose is Digital Rights Management and computer security. The system decides what software had been legally obtained and would be allowed to run on the computer, and what software, such as illegal copies or viruses and Trojans, should be disabled. The whole process would be governed by Windows, and through remote access, by Microsoft.
Now there is a new set of specifications out, creatively dubbed TPM 2.0. While TPM allowed users to opt in and out, TPM 2.0 is activated by default when the computer boots up. The user cannot turn it off. Microsoft decides what software can run on the computer, and the user cannot influence it in any way. Windows governs TPM 2.0. And what Microsoft does remotely is not visible to the user. In short, users of Windows 8 with TPM 2.0 surrender control over their machines the moment they turn it on for the first time.
tesla69 is offline   |QUOTE AND REPLY|